Homework Help - Post Questions, Assignments & Papers

Studypool values your privacy. Only questions posted as Public are visible on our website.

Computer Programming Question

Anonymous

labelEnglish

timer
Asked: Jan 19th, 2015

Question description

Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry.

For a grade of A, a minimum of five authoritative sources (not including course modules and the course textbook) are required.

For a grade of B, a minimum of four authoritative sources (not including course modules and the course textbook) are required.

For a grade of C, a minimum of three authoritative sources (not including course modules and the course textbook) are required.

Your research is to be incorporated into a 3- to 5-page written analysis of the attack or incident. Your report is to be prepared using APA formatting and submitted as an MS Word attachment to the Cybersecurity Research Paper entry in your assignments folder.

After you have performed your research, use your sources to analyze the major characteristics of the cybersecurity incident. Your analysis must include:

identifying the type of breach

identifying and explaining how the breach occurred (or suspicions by authorities as to how it may have occurred)

identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems

identifying and discussing technological improvements that would help prevent recurrence

Grading Rubric: the detailed rubric is attached to the assignment folder entry for this paper.

Rubric Name: Research Paper Rubric

Criteria

Level 6

Level 5

Level 4

Level 3

Level 2

Level 1

Identifies and Introduces the Attack or Breach (20%)

20 points

Completely and thoroughly introduces the security incident or attack using the 5W formula (who, what, when, where, why). Discussion clearly identifies and briefly summarizes the attack, the attackers, and the information, information systems, and networks which were attacked (includes identification of victims).

18 points

Introduces the security incident or attack using the 5W formula (who, what, when, where, why, and how). Discussion clearly identifies and briefly summarizes the attack, the attackers, and the information, information systems, and networks which were attacked (includes identification of victims).

16 points

Introduces the security incident or attack using the 5W formula (who, what, when, where, why, and how). Discussion mentions the attack, the attackers, and the targets (victims).

14 points

Introduces the attack, the attackers, and the victims. Uses at least three of the criteria from the 5W formula (who, what, when, where, why, and how).

10 points

Introduces the attack, the attackers, and the victims. Provides some information about where and when.

0 points

Research paper does not have an identifiable introduction that provides information about the attack, the attackers, and/or the victims.

Means & Methods Used in the Attack (20%)

20 points

Completely and thoroughly discusses how the attack or security breach occurred or the suspected means / methods used by the attackers. Paper includes a separate major section which addresses the means and methods used in the attack. Addresses specific exploits or tools used in the attack or the suspected means / methods used by attackers. Discussion identifies and provides an assessment of security controls which were ineffective. Discussion addresses specific known or suspected vulnerabilities which were exploited by the attackers.

18 points

Paper includes a separate major section which addresses the means and methods used in the attack. Identifies and discusses how the attack or security breach occurred. Addresses specific exploits or tools used in the attack or the suspected means / methods used by the attackers. Identifies and provides an assessment of security controls which were ineffective. Addresses known or suspected vulnerabilities which were exploited by the attackers.

15 points

Paper includes a complete and easily identifiable discussion of the means and methods used during the attack or the suspected ways in which the security breach occurred. (Add 1 point for discussion of specific exploits or tools used in the attack or the suspected means / methods used by the attackers. Add 1 point for discussion of security controls which were ineffective. Add 1 point for discussion of vulnerabilities which were exploited by the attackers).

10 points

Identifies and discusses how the attack or security breach occurred or the suspected means / methods used by the attackers. Discusses one of the following: (a) tools & exploits, (b) ineffective security controls, or (c) vulnerabilities.

5 points

Mentions how the attack occurred but does not specifically address means / methods, tools, exploits, security controls, or vulnerabilities.

The research paper contains a separate and thorough discussion of the known or suspected impacts of the attack upon the confidentiality, integrity, availability, authentication, and non-repudation characteristics of the targeted or impacted information, information systems, and/or networks. (All five characteristics are defined, discussed, and analyzed.)

18 points

The research paper contains a separate and thorough discussion of the known or suspected impacts of the attack upon the confidentiality, integrity, availability, authentication, and non-repudation characteristics of the targeted or impacted information, information systems, and/or networks. (At least four of the characteristics are defined, discussed, and analyzed.)

15 points

The research paper contains a separate and easily identified section which provides a discussion of the known or suspected impacts of the attack upon the confidentiality, integrity, availability, authentication, and non-repudation characteristics of the targeted or impacted information, information systems, and/or networks. (At least three of the characteristics are defined, discussed, and analyzed.)

12 points

The research paper contains a separate and easily identified section which provides a discussion of the known or suspected impacts of the attack upon the confidentiality, integrity, availability, authentication, and non-repudation characteristics of the targeted or impacted information, information systems, and/or networks. (At least two of the characteristics are defined and discussed.)

10 points

The research paper contains mention of known or suspected impacts of the attack upon the confidentiality, integrity, availability, authentication, and non-repudation characteristics of the targeted or impacted information, information systems, and/or networks. (At least one characteristic is discussed.)

0 points

The research paper does not contain any mention of the impacts of the attack.

Identifies Technology Improvements (10%)

10 points

The paper includes a section devoted to discussing technology improvements which could have prevented, detected, and deterred the attack. Discussion addresses technology improvements in security controls and vulnerability identification / remediation. The discussion appropriately uses at least 3 of the 5 Pillars of Information Assurance (confidentiality, integrity, availability, authentication, non-repudiation).

9 points

The paper includes a section devoted to discussing technology improvements which could have prevented, detected, and deterred the attack. OR, discussion addresses technology improvements in the area of security controls and vulnerability identification / remediation. The discussion appropriately uses at least 3 of the 5 Pillars of Information Assurance (confidentiality, integrity, availability, authentication, non-repudiation).

7 points

The paper includes discussion regarding technology improvements which could have prevented, detected, and/or deterred the attack (at least 2 of 3). Or, the paper includes discussion of technology improvements for security controls and vulnerability identification/remediation. The discussion appropriately uses at least 3 of the 5 Pillars of Information Assurance (confidentiality, integrity, availability, authentication, non-repudiation).

5 points

The paper includes discussion about technology improvements which could prevent similar attacks in the future. Discussion appropriately uses at least 3 of the 5 Pillars of Information Assurance (confidentiality, integrity, availability, authentication, non-repudiation).

3 points

The cybersecurity research paper mentions technology improvements that might prevent or deter future attacks. Mentions one or more of the 5 Pillars of Information Assurance (confidentiality, integrity, availability, authentication, non-repudiation).

0 points

The cybersecurity research paper does not address technology improvements as a means for preventing similar attacks in the future.

Quality of Research: Selection and Citing of Sources (10%)

10 points

Research paper incorporates knowledge from 5 or more authoritative sources as evidenced by appropriate use of citations to credit sources for facts and information about the cybersecurity incident. Work contains a reference list containing entries for all cited resources.

9 points

Research paper incorporates knowledge from 4 or more authoritative sources as evidenced by appropriate use of citations to credit sources for facts and information about the cybersecurity incident. Work contains a reference list containing entries for all cited resources.

7 points

Research paper has no more than two paragraphs with omissions of citations crediting sources for facts and information about the cybersecurity incident. Work contains a reference list containing entries for all cited resources. Submitted work is based upon a minimum of three authoritative sources.

5 points

Work has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Submitted work is based upon a minimum of two authoritative sources.

3 points

Author attempted to credit authoritative sources did so in a manner that did not provide the reader with sufficient information to verify sources of information used in the research paper. Or, the author reported factual information without identifying / crediting sources beyond the required readings for the course.

0 points

Reference list is missing. Work demonstrates an overall failure to research the cybersecurity incident. The submitted research paper does not credit authoritative sources for facts and other information used in the paper.

Professionalism in Organization & Appearance (5%)

5 points

Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.

4 points

Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions).

3 points

Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved.

2 points

Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement.

1 point

Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance.

0 points

Submitted work is poorly organized and formatted. Writing and presentation are lacking in professional style and appearance. Work does not reflect college level writing skills.

Professionalism in Writing Style (10%)

10 points

No formatting, grammar, spelling, or punctuation errors.

8 points

Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance.

6 points

Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work

4 points

Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance.

2 points

Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage.

0 points

Submitted work is poorly executed OR does not reflect college level work.

APA Style Compliance (5%)

5 points

Reference list, reference list entries and in-text citations are complete (contain all required fields) and are formatted to APA style. In-text citations are placed at point of first use in each paragraph. In-text citations are correctly placed within the sentence to which they apply. (1 or 2 minor errors allowed.)

4 points

Reference list, reference list entries and in-text citations are complete (contain all required fields) and are formatted to APA style. In-text citations are placed at point of first use in each paragraph. In-text citations are correctly placed within the sentence to which they apply. No more than 3 minor errors in APA style compliance for in-text citations and/or reference list entries.

3 points

In-text citations are placed at point of first use in each paragraph. In-text citations are correctly placed within the sentence to which they apply. No more than 5 minor errors in APA format for in-text citations and/or reference list entries. Citations and reference list entries contain sufficient information for the reader to find and verify the resource.

2 points

Work contains no more than 7 minor errors in APA format for in-text citations and/or reference list entries. Citations may be misplaced or missing required information. Reference list entries contain enough information for the reader to find and verify the resource.

1 point

Work does not comply with APA formatting requirements for reference list entries and in-text citations. Reference list entries contain enough information for the reader to find and verify the resource.

0 points

Reference list and in-text citations do not contain enough information for the reader to find and verify resources used to write the paper. Or, reference list and citations are missing entirely.